REplay: Reverse Engineering Playground
Ctrlk
SkyPenguin Labs
  • Introduction
    • What Is REplay?
    • Running The CTF - Know XYZ
    • Scenario
    • FaQ - Frequently Asked Questions
  • REplay
    • Levels
    • Writeups
      • Level 1 - All Walkthroughs
        • Find the unencrypted API key
        • Find the HTTP-BasicAuth formatted username and password
        • Find the CTF information block
        • Find the encrypted API key
        • Crack the first login system
        • Modify the variable of the hide menu functionality
        • Authentication Server Investigation
        • Security Systems In This CTF
        • Pseudocode representation of the login system
        • Find the integer based key used to compare the input license in the GUI.
        • Figure out where the pre-determined login statement is being made.
        • Find the hotkey that is used to exit the menu and kill the current process
        • Bypass entirely - login system
      • Level 2 - All Walkthroughs
      • Level 3 - All Walkthroughs
      • Level Exploits / Scripts
      • REplay - Exploring Further
      • REplay - Suggested Resources For RE
      • REplay - L1-3 Goal Pages
    • REplay - Extras
    • Finished!
Powered by GitBook
Page cover
On this page
  1. REplay
  2. Writeups
  3. Level 1 - All Walkthroughs

Figure out where the pre-determined login statement is being made.

PreviousFind the integer based key used to compare the input license in the GUI.NextFind the hotkey that is used to exit the menu and kill the current process